e Commercefinalrahulmathur 141014050859 Conversion Gate01

download e Commercefinalrahulmathur 141014050859 Conversion Gate01

of 32

Transcript of e Commercefinalrahulmathur 141014050859 Conversion Gate01

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    1/32

     

    ELECTRONIC COMMERCE

    Rahul Mathur, BCA-III Year

    Bachelor of Computer ApplicationsDezyne E’cole College, Ajmer

    www.dez neecole.com

    Information Technology-------------------------

    Submitted By

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    2/32

     

    ACKNOWLEDGEMENT

    I Am Thankful To Dezyne E’cole College To Help In Making This Project On E-Commerce. A Special Thanks To Ms. Jyoti Phulwani to Guide Us Step By Step in theMaking of This Project Report.

    Thanking You

    Rahul MathurBachelor of Computer ApplicationsIII Year  

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    3/32

     

    CONTENTS 

    1. Chapter 1

      Introduction

    2. Chapter 2 

      Electronic Commerce and the World Wide Web

    3. Chapter 3   Architectural Framework for Electronic Commerce

    4. Chapter 4 

      Technology Behind the Web

    5. Chapter 5 

      Network Security and Firewalls

    6. Chapter 6 

      Electronic Commerce Companies

    7. Chapter 7 

      Pictorial Representation: E-Buying Methodology

    8. Chapter 8 

      Conclusion

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    4/32

    Chapter 1

    Introduction

    Every individual of company that wants to make money and become the next

    Microsoft needs to understand the market potential, business implication andtechnological foundations of electronic commerce. But what is electronic commerceeverybody is talking about. How does it affect the organisation way of doingbusiness? What sort of technical and business skills are needed to be successful?

    Companies and consumers are discovering that global networking and othertechnological innovations are powerful assets if used as competitive weapons in their

    day to day activities. E-Commerce is associated with the buying and selling ofinformation, products and services via computer network today.

    Consumer desires are very hard to predict pin point or decipher in electronic marketswhose shape, structure and population are still in early stages. Needs envisionedinclude entertainment on demand including 500 channel T.V., video on demand,games on demand, electronic retailing via catalogues and Kiosks and home shopping

    networks. In future, viewers will decide what they want to see and when they want toparticipate and successful market places are expected to those that cater to

    consumer’s loneliness, boredom, education and career. In highly competitive society,where neighbours seldom talk to one another, these outlets give consumer someone

    to talk after going home.

    Let’s take a look at the changing conditions in the “new economy” with respect to theretail industry. Consumers are pushing retailers to the wall demanding lower prices,

    better quality, and a large section of in-season goods. Retailers are scrambling to fillthe order. They are slashing back-office cost reducing profit-margins, reducing cycletimes, buying more wisely and making huge investment in technology. They arerevamping distribution channels to make sure that warehouses costs are down byreducing their average inventory levels and coordinating the consumer demand and

    supply pattern.

    In the push to reduce prices more and more retailers are turning to overseas suppliers

    in part because of cheaper labour costs. Retail are the immediate line of fire and hadto do the cost cutting. They put the pressure on the manufacturer and then to thesupplier end of the pipeline. Electronic commerce is forcing companies to rethink the

    existing ways of doing target marketing; relationship marketing and even eventmarketing. Adaptation would include moving towards computerised “paperless”operations to, reduce trading costs and facilitate the adoption of new businessprocess. Japanese approach JIT (Just in Time) system, total quality control andquality circles are focused now for delivery of goods through electronic commerce.

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    5/32

    Chapter 2

    Electronic Commerce and the World-Wide-Web

    We have broadly defined electronic commerce as a modern business methodology

    that addresses the desire of the firm, consumer and management to cut cost whileimproving the quality of goods and increasing the speed of services. The need forelectronic commerce stems from the demand within business and government tomake better use of computing, that is, better apply computer technology to improvebusiness process and information exchange both within an enterprise and acrossorganisations. In short, electronic commerce appears to be an integrating force that

    represents the digital conversions of twenty-first century business applications andcomputing technologies.

    Electronic commerce applications emphasize the generation and exploitation of new

    business opportunity and to use the popular buzzword, “generate business value”. For instance, when buyer-seller transactions occur in the electronic marketplace,

    information is accessed, absorbed, arranged and sold in different ways. In fact, theinformation a product or service is separated from the physical product or service andhas become important on its own. In some cases, the information can become ascrucial as the actual product or service in terms of its effect on a company’s profits. In short, information based business transactions are creating new ways of doing

    business and even new types of business.

    Electronic commerce application are quite varied. In its most common form, E-Commerce is also used to donate the paperless exchange of business information

    using EDI, Electronic Mail (E-Mail), Electronic Bulletin Boards, Electronic FundTransfer (EFT) and other similar technologies. These technologies are normally

    applied in high-payoff areas, recognizing that paper-handling activities usuallyincrease expense without adding value. On the other hand, the term electronic

    commerce is used to describe a new on-line approach to perform traditional

    functions such as payment and funds transfer, order entry and processing, invoicing,inventory management, cargo tracking, electronic catalogue and point-of-sale, data

    gathering. More recently, companies have realised that the advertising, marketing

    and customer support functions are also part of electronic commerce applicationdomain. These business functions acts as initiators to the entire order managementcycle that incorporates the more established notions of electronic commerce. In

    short, what we are witnessing is the use of the term electronic commerce as anumbrella concept to integrate a wide range of new and old applications.

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    6/32

     

    Despite the changes taking place, businesses have three goals: stay competitive,improve productivity and deliver quality service. These goals are the guiding boys for

    firms plotting their course in the turbulent waters of electronic commerce. There areother factors that companies need to keep in mind. First, most companies havealready made enormous information technology investments to automate their key

    internal processes such as purchasing, invoicing and other similar functions. So,

    some aspects of the technological infrastructure for electronic commerce are alreadyin place. The challenge now become: How to effectively leverage this investment.Second, prices for computer hardware and network equipment continue to fall,

    marking information technology an appealing investment for many businesses,especially when it’s used for  high-impact applications such as linking their distributedoperations. However, investment without a clear idea of the electronic commerce

    architecture being built would be akin to driving with blinders on. As a result,companies that have decided that electronic commerce applications represent one

    of the best strategic investment they can make must first exert some effort to

    understand the technology underlying electronic commerce applications.

     At first glance, it appears that messaging based technologies such as EDI and Male-

    Enabled applications, combined with database and information management service,form the technical foundation for effective electronic commerce solutions. No single

    one of these technologies can deliver the full potential of electronic commerce,however. What we require is an integrated architecture the likes of which has neverbeen seen before. This integrated architecture is emerging in the form of the World

    Wide Web (WWW). As electronic commerce becomes more mature, we arebeginning to see sophisticated applications being developed on WWW. Technically

    and commercially, the WWW client-server model seems poised to become adominant technology.

    Electronic Data Interchange (EDI)Electronic Funds Transfer (EFT)

    Information Sharing

    Collaborative Work

    Corporate

    Digital

    Library

    Electronic Commerce

    Marketing, Advertising

    Sales, Customer Support

    Electronic

    Publishing

    E-mail Fax

    Electronic Messaging

    Electronic Document Interchange

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    7/32

    Chapter 3

    Architectural framework for Electronic Commerce

    The software framework necessary for building electronic commerce applications islittle understood in existing literature. In general a framework is intended to defineand create tools that integrate the information found in today’s closed systems and

    allow the development of e-commerce applications. It is important to understand thatthe aim of the architectural framework itself is not to build new database management

    systems, data repository, computer languages, software agent-based transactionmonitors or communication protocols. Rather, the architecture should focus on

    synthesizing the diverse resources already in place in corporations to facilitate theintegration of data and software for better applications. 

    We propound that the electronic commerce application architecture consist of sixlayers of functionality or services:

    1) Application2) Brokerage services, data or transaction management3) Interface and support layers4) Secure messaging and electronic document interchange5) Middleware and structured document interchange

    6) Network infrastructure and basic communication services

    Applications ServicesCustomer-to-BusinessBusiness-to-BusinessIntra-organisational

    Brokerage and data managementOrder processing-mail order housesPayment scheme-electronic cashClearinghouse or virtual mall

    Interface layer

    Interactive catalogueDirectory support functionSoftware agents

    Secure messagingSecure Hypertext Transfer ProtocolEncrypted e-mail, EDIRemote programming (RPC)

    Middleware servicesStructure documents (SGML, HTML)Compound document (OLE, OpenDoc)

    Network infrastructure Wireless-cellular, radio, PCSWire line-POTS, Coaxial, Fibre Optics

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    8/32

    These layers cooperate to provide a seamless transition between today’s computingresources and those of tomorrow by transparently integrating information access andexchange within the context of the chosen application. As seen in above figure,

    electronic commerce applications are based on several elegant technologies. Butonly when they are integrated do they provide uniquely powerful solutions.

    In the ensuing discussion of each of these layers, we will not elaborate on the variousaspects of the network infrastructure that transports information.

    Electronic Commerce Application Services

    The application services layer of e-commerce will be comprised of existing andfuture applications built on innate architecture. Three distinct classes of electronic

    applications can be distinguished: Customer-to-Business, Business-to-Businessand Intra-organisation.

    Accounting,

    Finance and

    Management

    Manufacturing

    and

    Production

    Engineering

    and

    Research

    Procurement, Distribution and Logistics

    Advertising Sales Customer Service

    Global Suppliers

    Classic EDI

    Customers

    Customer Oriented

    Electronic Commerce

    PrivateCommerce

    InternalPublishing

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    9/32

    o  Customer-to-Business Transaction

    We call this category market place transaction. In a market place transaction,customers learn about products differently through electronic publishing, buy them

    differently using electronic cash and secure payment systems, and have them

    delivered differently. Also, how customers allocate their loyalty may also bedifferent.In light of this, organisation itself has to adapt to a world where the traditionalconcepts of brand differentiation no longer hold-where “Quality” has a new meaning,

    where “Content” may not be equated to “Product”, where “Distribution” may notautomatically mean “Physical Transport”. In this new environment, brand equity can

    rapidly evaporate forcing firms to develop new ways of doing business.

    o  Business-to-Business Transaction

    We call this category market-link transactions. Here, businesses, government andother organisations depend on computer-to-computer communication as a fast, aneconomical and a dependable way to conduct business transactions. Smallcompanies are also beginning to see the benefits of adopting the same methods.Business-to-business transactions include the use of EDI and Electronic mail for

    purchasing goods and services, buying information and consulting services,submitting request for proposals and receive proposals.

    For example, the current accounts payable process occurs through the exchange

    of paper documents. Each year the trading partners exchange millions of invoices,checks purchase orders, financial reports and other transactions. Most of thedocuments are in electronic form at their point of origin but are printed and key-entered at the point of receipt. The current manual process of printing, mailing andrekeying is costly, time consuming and error-prone. Given this situation and faced

    with the need to reduce costs, small businesses are looking towards electroniccommerce as possible saviour.

    o  Intra-organisational transaction

    We call this category, market-driven transactions. A company becomes market

    driven by dispersing throughout the firm information about its customers andcompetitors; by spreading strategic and tactical decision making so that all units canparticipate; and by continuously monitoring their customer commitment by makingimprove customer satisfaction an ongoing objective. To maintain the relationshipsthat are critical to delivering superior customer value, management must play close

    attention to service, both before and after sales.

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    10/32

     Information Brokerage and Management

    The information brokerage and management layer provide service integrationthrough the notion of information brokerages, the development of which is

    necessitated by the increasing information resource fragmentation. We use the

    notion of information brokerage to represent an intermediary who provides serviceintegration between customers and information providers, given some constraintsuch as a low price, fast service or profit maximisation for a client.

    Information brokers, for example are rapidly becoming necessary in dealing with the

    voluminous amounts of information on the networks. As online database migrate toconsumer information utilities, consumers and information professionals will haveto keep up the knowledge and ownership of all these systems. Who’s got what?

    How do you use it? What do they charge? Most professionals have enough trouble

    keeping track of files of interest on one or two database services. With all thecomplexity associated with large number of online database and service bureaus,it’s  impossible to expect humans to do the searching. It will have to be softwareprograms-information brokers or software agents, to use the most popular term-Acton searcher’s behalf. Information brokerage does more than just searching.

    Interface and Support Services

    The third layer, interface and support services, will provide interfaces for electronic

    commerce applications such as interactive catalogues and will support directoryservices-functions necessary for information search and access. These two

    concepts are very different. Interactive catalogues are the customized interface toconsumer applications such as home shopping. An interactive catalogue is anextension of the paper-based catalogue and incorporates additional features suchas sophisticated graphics and video to make the advertising more attractive.

    Directories, on the other hand, operate behind the scenes and attempt to organisethe enormous amount of information and transactions generated to facilitateelectronic commerce. Directory services database make data from any serverappear as a local file. A classic example of a directory is the telephone White Pages,

    which allows us to locate people and telephone numbers. In the case of electroniccommerce, directories would play an important role in information managementfunctions. For instance, take the case of buying an airline ticket with severalstopovers with a caveat that the time between layovers be minimized. This searchwould require several queries to various online directories to find empty seats on

    various airlines and then the availability of seats would be coordinated with theamount of time spent in the airport terminals.

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    11/32

     

    Secure Messaging and Structured Document Interchange

    Services

    The importance of the fourth layer, secure messaging, is clear. Everyone in

    business knows that electronic messaging is a critical business issue. Consider afamiliar business scenario; you hand over an urgent fax on Monday and find out onTuesday that it’s still sitting on your fax operator’s desk. What happened? The linewas busy and he thought he would try again later. Or, the number was wrong, but

    he forgot to let you know. Or you are in London and you need to send a spreadsheetthat details a marketing plan for a product introduction strategy to co-worker in New

    York. This must be done today, not tomorrow when the courier service woulddeliver. There is a solution to these common and frustrating problems. It’s calledintegrated messaging: a group of computer services that through the use of a

    network send, receive and combine messages, faxes and large data file. Somebetter known examples are electronic mail, enhance fax and electronic data

    interchange.

    Broadly defined, messaging is the software that sits between the networkinfrastructure and the clients or electronic commerce applications, masking the

    peculiarities of the environment. Others define messaging as a framework for thetotal implementation of portable applications, divorcing you from the architecturalprimitives of your system. In general, messaging products are not applications that

    solve problems; they are more enablers of the application that solve problems.

    Messaging services offer solution for communicating non-formatted (unstructured)data such as purchase orders, shipping notices and invoices. Unstructuredmessaging consist of fax, e-mail and form based system like Lotus Notes.Structured documents messaging consist of the automated interchange ofstandardized and approved messages between computer applications via

    telecommunication lines. Examples of structured document messaging include EDI.

    Messaging is gaining momentum in electronic commerce and seems to have manyadvantages. It supports both synchronous (immediate) and asynchronous (delayed)

    message delivery and processing. With asynchronous, when a message is sent,work continues (software doesn’t wait for a response). This allows the transfer ofmessages through store-and-forward methods.

    The main disadvantages of messaging are the new types of applications it enables-

    which appear to be more complex, especially to traditional programmers-and the jungle of standards it involves. Because of the lack of standards, there is often no

    interoperability between messaging vendors leading to islands of messaging. Also,

    security, privacy and confidentiality through data encryption and authentication

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    12/32

    techniques are important issues that need to be resolved for ensuring the legality ofthe message-based transactions themselves.

    Middleware Services

    Middleware is a relatively new concept that emerged only recently like so manyother innovations, it came into being out of necessity. Users in the 1970s, when

    vendors delivered homogenous systems that worked, didn’t have a need formiddleware. When conditions changed-along with the hardware and the software

    the organisations couldn’t cope: The tools were inadequate, the backlog wasenormous, and the pressure was overwhelming. And, the users were dissatisfied.Something was needed to solve all the interface, translation, transformation and

    interpretation problems that were driving application developers crazy.

    With the growth of networks, client-server technology, and all other forms ofcommunicating between/among unlike platforms, the problems of getting all thepieces to work together grew from formidable to horrendous. As the cry fordistributed computing spread, users demanded interaction between dissimilarsystems, networks that permitted shared resources, and applications that could be

    accessed by multiple software programs. In simple terms middleware is the ultimatemediator between diverse software programs that enables them talk to one another.

    Transparency

    Transparency implies that users should be unaware that they are accessing multiplesystems. Transparency is essential for dealing with higher-level issues thanphysical media and interconnection that the underlying network infrastructure is incharge of. The ideal picture is one of a “Virtual” network: a collection of work-group,departmental, enterprise and enterprise LANs that appears to the end user or client

    application to be a seamless and easily accessed whole.

    Transparency is accomplished using middleware that facilitates a distributedcomputing environment. This gives users and applications transparent access to

    data, computation, and other resources across collections of multivendor,heterogeneous systems. The strategic architectures of every major system vendorare now based on some form of middleware. The key to realising the theoreticalbenefit of such an architecture is transparency. Users need not spend their timetrying to understand where something is. Nor should application developers have to

    code into their applications the exact locations of resources over the network. Thegoal is for the applications to send a request to the middleware layer, which then

    satisfies the request anyway it can, using remote information.

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    13/32

     Transaction Security and Management

    Support for transaction processing (TP) is fundamental to success in the electroniccommerce market. Security and management are essential to all layers in the

    electronic commerce model. Transaction integrity must be given for businesses that

    cannot afford any loss or inconsistency in data. For electronic commerce,middleware provides the qualities expected in the standard TP System: the so-called ACID properties (Atomicity, Consistency, Isolation and Durability).

    World Wide Web (WWW) As the Architecture

    Electronic commerce depends on the unspoken assumption that computerscooperate efficiently for seamless information sharing. Unfortunately, thisassumption of interoperability has been supported by the realities of practical

    computing. Computing is still a world made up of many technical directions, productimplementations and competing vendors. This diversity, while good for innovation

    causes problem as the e-commerce applications try to impose a certain disciplineon the proliferating computers and networks. It is ironic that real effect of computingis all too often then prevention of data sharing due to incompatibilities-architectures,data formats and communication protocols.

    What does the Web Encompass?

    The web has become an umbrella for wide range of concepts and technologies thatdiffer markedly in purpose and scope. These include the global hypertext publishingconcept, the universal reader concept and the client-server concept.

    The global hypertext publishing concept promotes the idea of a seamlessinformation world in which all on-line information can be accessed and retrieved ina consistent and simple way. To access information in this seamless world, we willneed the ability to address many types of data-text files, images, sound files and

    animation sequences.

    The universal readership concept promotes the idea that, unlike the segmentedapplications of the past, we can use one application-a universal (or common) user

    interface-to read a variety of documents. This concept implies that once informationis published it is accessible from any type of computer, in any country and that any(authorised) person merely needs to use one simple program to access it. This is

    accomplished in the web by using a core browser or application that is augmentedby supporting applications. The core browser implements only minimal functionality

    and attempts to offload more specialised work onto the supporting applications.

    The client server concept allows the web to grow easily without any centralisedcontrol. Anyone can publish information and anyone (as long as he or she is

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    14/32

    authorized) can read and download it. Publishing information requires a serverprogram and reading data requires a client browser. All the clients and all theservers are connected to one another by the Internet. The various standard

    protocols allows all clients to communicate with all servers. In practice the webhangs on a number of essential concepts, including the following:

      The addressing scheme known as uniform resource locator (URL) makes thehyper media world possible despite many different protocols.

      A network protocol known as hypertext transfer protocol (HTTP) used by client

    browsers and servers offers performance and features not otherwise available.

      A mark-up language (HTML), which every web client is required to understand,

    is used for the representation of hypertext documents containing text, list boxesand graphics information across the net.

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    15/32

    Chapter 4 

    Technology behind the Web

    Information providers (or publishers) run programs (called servers) from which the

    browsers (clients) can obtain information. These programs can either be Web serversthat understand the hypertext transfer protocol (HTTP), “Gateway”  programs that

    convert an existing information format to hypertext, or a non-HTTP server that Webbrowser can access-anonymous FTP or Gopher servers.

    Web servers are composed of two major parts: the hypertext transfer protocol fortransmitting documents between servers and clients and the hypertext mark-uplanguage (HTML) format for documents. The link between HTML files and the HTTP

    servers is provided by the uniform resource locators (URLs).

    Uniform Resource Locator (URL)

    The documents that the browsers display are hypertext that contains pointers to otherdocuments. The browser let you deal with the pointers in a transparent way-selectthe pointer and you are presented with the text to which it points. This pointer is

    implemented using a concept that is central to Web browsers: Uniform ResourceLocators (URLs). One way to think about URLs is to use the libraries and location ona shelf as a metaphor. A URL for a digital library wold be a unique call number thatprovides the exact location of every book in the world, including the country, city,

    street and library shelf location.

    In practice, URLs are the string used as addresses of objects (documents, images)on the web. Think of them as analogous to your e-mail address. Just as your addressis unique and may be used by any other Internet user to send you mail without

    knowing exactly where you are, a URL marks the unique location on the Internetwhere a file or service can be found.

    URLs follow a fairly consistent pattern. The first part describes the type of resource;

    the second part gives the name of the server housing the resource; and the third part

    gives full filename of the resource. URLs are universal in that they provide access toa wide range of network services which required separate applications in the past.

    For a new network protocol one can easily form an address as the set of parametersnecessary to retrieve the object. If these parameters are encoded into a concise

    string, with a prefix to identify the protocols and encoding, one has a new URLscheme. Take a look at the URL format below:

    FTP : ftp://server.address/complete.file.name Gopher : gopher://server.address:port/directory/filename 

    TELNET : telnet://server.address:port HTTP : http://server.address:port/homepage.html 

    New : news:misc.stocks.invest 

    ftp://server.address/complete.file.nameftp://server.address/complete.file.nameftp://server.address/complete.file.namehttp://gopher//server.address:port/directory/filenamehttp://gopher//server.address:port/directory/filenamehttp://gopher//server.address:port/directory/filenamehttp://telnet//server.address:porthttp://telnet//server.address:porthttp://telnet//server.address:porthttp://telnet//server.address:porthttp://gopher//server.address:port/directory/filenameftp://server.address/complete.file.name

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    16/32

    These are URLs for internet news articles and news groups (the NNTP protocol) andfor HTTP archives, for TELNET destinations, e-mail addresses and so on. The samecan be done for names of objects in a given name space.

    For example, the URL of the main page for the web project happens to be:http://web.w3.org/hypertext/web/TheProject.html

    The prefix “http” in the preceding example indicates the address space and definesthe interpretation of the rest of the string. The HTTP protocol is to be used, so thestring contains the address of the server to be contacted and a substring to be passed

    to the server. As noted earlier, different protocols use different syntaxes, but they dohave a small amount in common. For example, the common URL syntax reservesthe solidus (/) as a way of representing a hierarchical space, the pound label (#) asa way of pointing inside the document and question mark (?) as a separator betweenthe address of an object and a query operation applied to it. Hierarchical spaces are

    useful for hypertext, where one “work” may be split up into many interlinked

    documents. The # allows relative names to exploit the hierarchical structure andallows links to be made within the work independent of the higher parts of the URL,such as the server name.

    URLs are central to the web architecture. The fact that it is easy to address an object

    anywhere on the internet is essential for the system to scale and for the informationspace to be independent of the network and server topology.

    http://web.w3.org/hypertext/web/TheProject.htmlhttp://web.w3.org/hypertext/web/TheProject.html

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    17/32

    Chapter 5

    Network Security and Firewalls

    The ability to conduct business on a public network has strong attraction-and the

    potential for big savings. Security and confidentiality are essential, however, beforebusinesses can conduct financial transactions over the internet and a lack ofwidespread security measures remains at this time. At present, credit card numbers,

    financial records and other important information are not encrypted and can beintercepted by any savvy Internet hacker.

    The discussion of security concern in electronic commerce can be divided into two

    broad types:

    1. Client-Server Security uses various authorization methods to make sure that only

    valid users and programs have access to information resources such asdatabases. Access control mechanisms must be set up to ensure that properlyauthenticated users are allowed access only to those resources that they are

    entitled to use. Such mechanisms include password protection, encrypted smartcards, biometrics and firewalls.

    2. Data and transaction security ensures the privacy and confidentiality in electronicmessages and data packets, including the authentication of remote users in

    network transactions for activities such as on-line payment. The goal is to defeat

    any attempt to assume another identity while involved with electronic mail or otherforms of data communication. Preventive measures include data encryption usingvarious cryptographic methods.

    Data and Message Security

    The lack of data and message security on the Internet has become a profile problemdue to increasing number of merchants trying to spur commerce on the global

    network. For instance, credit card numbers in their plain text form create a risk whentransmitted across the Internet where the possibility of the number falling into the

    wrong hands is relatively high. Would you be willing to type in your credit card numberknowing the risk? Even worse, would you expose your customers to that risk? Just

    the thought of “sniffer” programs that collect credit card numbers en masse is enoughto keep merchants away from on-line shopping given the possible lawsuits and otherliability issues. In short, the lack of business transaction security is widely

    acknowledged as a major impediment to widespread e-commerce.

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    18/32

      Encrypted Documents and Electronic Mail

    E-mail users who desire confidentiality and sender authentication are usingencryption. Encryption is simply intended to keep personal thoughts personal. Some

    users are already using Pretty Good Privacy (PGP); others are starting to use Privacy

    Enhanced Mail (PEM).E-mail is typically encrypted for the reason that all network correspondence is openfor eavesdropping. Internet e-mail is obviously far less secure then the postal system,

    where envelopes protect correspondence from casual snooping. A glance at theheader area of any e-mail message, by contrast, will show that it has passed through

    a number of nodes on its way to you. Every one of these nodes present theopportunity for snooping.

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    19/32

    Chapter 6

    Electronic Commerce Companies

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    20/32

    Chapter 7

    Pictorial Representation: E-Buying Methodology

    Buying Procedure on on-line shopping website, Flipkart.

    Step 1 -

    Go to the link of the website, www.flipkart.com 

    http://www.flipkart.com/http://www.flipkart.com/http://www.flipkart.com/http://www.flipkart.com/

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    21/32

    Step 2 -

    Select the desired product category you want to buy.

    Step 3 -

    Choose the product you want to buy.

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    22/32

    Step 4 -

    On the product’s page, click on Add to WISHLIST to add more products to your

    recent shopping.

    Step 5 – Either Log-In or Sign-Up to add more products to you Wish List.

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    23/32

    Step 6 -

    To buy, click on BUY NOW button on the product’s page. Then click on PLACE

    ORDER button to place your order.

    Step 7 -Now, it will ask, whether you are existing customer or a newcustomer. Choose desired option and then click on CONTINUE.

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    24/32

    Step 8 -

     You are required to fill up all the details asked in the form, then click on SAVE

    AND CONITNUE.

    Step 9 -

    Click on CONTINUE button by confirming your purchase.

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    25/32

    Step 10 -

    Select the desired PAYMENT METHOD, according to your facility.

    Step 11 -

    Fill up the details and click on PAY.

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    26/32

      Buying Procedure on on-line shopping website, Yepme.

    Step 1 -

    Step 2 -

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    27/32

    Step 3 -

    Step 4 -

     

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    28/32

    Step 5 -

    Step 6 -

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    29/32

    Step 7 -

    Step 8 -

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    30/32

    Step 9 -

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    31/32

    Chapter 8

    Conclusion

    E-Commerce is growing tremendously. A lot of companies have joined between the periodJuly and August. Online retail is still a tiny spot in India’s retail market of about $500 billiona year, but it is growing at a quick pace. A study by retail consultancy Technopark predictsIndia’s e-tailing market will reach $32 billion by 2020 from $2.3 billion in 2014.

    Ethnic Indian clothes and casual work are favourite products but unusual products like pets-too are being offered online. With the huge growth that e-commerce has witnessed in recenttimes analysed like Devyanshu Dutta, says there is scope for more players to come in. butsome also warn about the risks the space is fraught with, as only a few chances of makingit big. They also see consolidation in the sector going forward.

  • 8/17/2019 e Commercefinalrahulmathur 141014050859 Conversion Gate01

    32/32

    BIBLIOGRAPHY

      Frontiers of Electronic Commerce by Ravi Kalakota and Andrew B. Whinston

      Big E-Commerce deals stir up sector-Economic Times

      www.Flipkart.com 

      www.Yepme.com 

    http://www.flipkart.com/http://www.flipkart.com/http://www.yepme.com/http://www.yepme.com/http://www.yepme.com/http://www.flipkart.com/